1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalija [7]
1 year ago
9

What option in the zone aging/scavenging properties dialog box will prevent dns record time stamps from being updated too often?

Computers and Technology
2 answers:
Maksim231197 [3]1 year ago
8 0

A timestamp is sent to each record that a DNS client creates. The most frequent reason for DNS records disappearing from DNS zones is scavenging.

<h3>What is a timestamp in a DNS record?</h3>

A timestamp is sent to each record that a DNS client creates. Every 24 hours, the DNS client tries to update this record. The timestamp is locked for default of seven days and cannot be renewed until the record is altered (for instance, the client gets a new IP address).

Resource records are the official term for DNS (domain name system) records. Furthermore, we classify them as DNS query types on the BlueCat platform. Both of these names are used equally. Approximately 90 different forms of official resource records exist.

The most frequent reason for DNS records disappearing from DNS zones is scavenging. Every 24 hours, records on Windows-based systems with statically allocated servers are registered. Check to see if the No Refresh and Refresh intervals are inadequate.

Therefore, the correct answer is option c. No-refresh interval

The complete question is:

What option in the Zone Aging/Scavenging Properties dialog box will prevent DNS record time stamps from being updated too often?

a. The zone can be scavenged after

b. Scavenge stale resource records

c. No-refresh interval

d. Refresh interval

To learn more about DNS records refer to:

brainly.com/question/9686093

#SPJ4

professor190 [17]1 year ago
5 0

Answer:

The statement is true

Explanation:

You might be interested in
What are the five types of alignment in word?
valentinak56 [21]
I know of four,
Left-aligned
Center-aligned
right-aligned
justified

5 0
3 years ago
Read 2 more answers
What are the 5 major components of computer.Give example of each​
notsponge [240]
1-Input unit
2-output unit
3-storage
4-central processing unit
5-arithmetic and logic unit
8 0
3 years ago
Can you help me in this question
Amiraneli [1.4K]

Answer:

6 2 and 0

Explanation:

This algorithm doesn't work if the list is not ordered ascending.

In this example it is not, and indeed the item "1" is never found.

first cycle: first=0, last=12 so midpoint=6

second cycle: first=0, last=5 so midpoint=2

last cycle: first=0, last=1 so midpoint=0

then last is assigned -1 so the while statement is no longer true.

7 0
2 years ago
What principle of interaction is John using?
Rainbow [258]

Answer:

but which john

Explanation:

man people don't make sense you more man

8 0
3 years ago
Read 2 more answers
Pleas pleas help and get 99 points with brainliest
storchak [24]
When you copy cells, cell references automatically adjust. But, when you move cells, cell references are not adjusted, and the contents of those cells and of any cells that point to them may be displayed as reference errors. In this case, you have to adjust the references manually.

If the selected copy area includes hidden cells, rows, or columns, Excel copies them. You may have to unhide data temporarily you don't want to include when you copy information.

Hope this helps! I'm not a computer genius though
5 0
3 years ago
Read 2 more answers
Other questions:
  • 7.14 LAB: Word frequencies Write a program that reads a list of words. Then, the program outputs those words and their frequenci
    10·1 answer
  • Answer all 1).The most common layout of keys on the keyboard is the _____ keyboard. ASDF QWERTY JKL QWOPY,
    5·2 answers
  • La computadora es un medio de comunicacion moderno?
    8·1 answer
  • Which of the following is a technique used by hackers to identify unsecured wireless network locations to other hackers?A. Blues
    10·1 answer
  • If you notice files being transferred to or from your computer a. Simply close the window c. Tell the lab instructor b. Open a n
    11·2 answers
  • Problem 5. (Greatest Common Divisor) Write a program gcd.py that accepts p (int) and q (int) as command-line arguments, and writ
    13·1 answer
  • Mary recently read about a new hacking group that is using advanced tools to break into the database servers of organizations ru
    14·1 answer
  • One way to use contiguous allocation of the disk and not suffer from holes is to compact the disk every time a file is removed.
    13·1 answer
  • 3.6 Code Practice Edhesive. (PYTHON LANGUAGE)
    13·1 answer
  • How do you mark the brainiest?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!